1. Trang chủ
  2. » Công Nghệ Thông Tin

comptia security+ study guide & practice exam, 2nd ed. [exam jk0-010]

866 713 0
Tài liệu đã được kiểm tra trùng lặp

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề CompTIA Security+ Study Guide & Practice Exam, 2nd Ed. [Exam JK0-010]
Tác giả Michael Cross
Trường học Elsevier, Inc.
Chuyên ngành Information Security
Thể loại study guide
Năm xuất bản 2007
Thành phố Burlington
Định dạng
Số trang 866
Dung lượng 13,04 MB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

xv Chapter 1 General Security Concepts: Access Control, Authentication, and Auditing.. 761 Chapter 1: General Security Concepts: Access Control, Authentication, and Auditing.. Following

Trang 3

INCLUDES FREE WEB-BASED TESTING!

S E C O N D E D I T I O N

Trang 4

“Makers”) of this book (“the Work”) do not guarantee or warrant the results to be obtained from the Work There is no guarantee of any kind, expressed or implied, regarding the Work or its contents.The Work is sold AS IS and WITHOUT WARRANTY.You may have other legal rights, which vary from state to state.

In no event will Makers be liable to you for damages, including any loss of profits, lost savings, or other incidental or consequential damages arising out from the Work or its contents Because some states do not allow the exclusion or limitation of liability for consequential or incidental damages, the above limitation may not apply to you.

You should always use reasonable care, including backup and other appropriate precautions, when working with computers, networks, data, and files.

Syngress Media®, Syngress®, “Career Advancement Through Skill Enhancement®,” “Ask the Author UPDATE®,” and “Hack Proofing®,” are registered trademarks of Elsevier, Inc “Syngress:The Definition of a Serious Security Library”™, “Mission Critical™,” and “The Only Way to Stop a Hacker is to Think Like One™” are trademarks of Elsevier, Inc Brands and product names mentioned in this book are trademarks or service marks of their respective companies.

Security+ Study Guide & DVD Training System, Second Edition

Copyright © 2007 by Elsevier, Inc All rights reserved Printed in the United States of America Except as permitted under the Copyright Act of 1976, no part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, without the prior written permission of the publisher, with the exception that the program listings may be entered, stored, and executed in a computer system, but they may not be reproduced for publication.

Printed in the United States of America

1 2 3 4 5 6 7 8 9 0

ISBN 10: 978-1-59749-154-9

Publisher: Amorette Pedersen Page Layout and Art: Patricia Lupien

Acquisitions Editor: Andrew Williams Copy Editor: Judith Eby

Technical Editor: Ido Dubrawsky Indexer: Michael Ferreira

Cover Designer: Michael Kavish

For information on rights, translations, and bulk sales, contact Matt Pedersen, Commercial Sales Director and Rights, email m.pedersen@elsevier.com.

Trang 5

Contributing Authors

Michael Cross(MCSE, MCP+I, CNA, Network+) is an Internet Specialist/Computer Forensic Analyst with the Niagara Regional Police Service (NRPS) He performs computer forensic examinations on computers involved in criminal investigation He also has consulted and assisted in cases dealing with computer-related/Internet crimes In addition to designing and maintaining the NRPS Web site at www.nrps.com and the NRPS intranet, he has provided sup- port in the areas of programming, hardware, and network administration As part of

an information technology team that provides support to a user base of more than

800 civilian and uniform users, he has a theory that when the users carry guns, you tend to be more motivated in solving their problems.

Michael also owns KnightWare (www.knightware.ca), which provides puter-related services such as Web page design, and Bookworms (www.book- worms.ca), where you can purchase collectibles and other interesting items online.

com-He has been a freelance writer for several years, and he has been published more than three dozen times in numerous books and anthologies He currently resides

in St Catharines, Ontario, Canada, with his lovely wife, Jennifer, his darling daughter, Sara, and charming son, Jason.

Jeremy Faircloth(Security+, CCNA, MCSE, MCP+I, A+, etc.) is an IT Manager for EchoStar Satellite L.L.C., where he and his team architect and main- tain enterprisewide client/server and Web-based technologies He also acts as a technical resource for other IT professionals, using his expertise to help others expand their knowledge As a systems engineer with over 13 years of real-world IT experience, he has become an expert in many areas, including Web development, database administration, enterprise security, network design, and project manage-

ment Jeremy has contributed to several Syngress books, including Microsoft Log

Parser Toolkit (Syngress, ISBN: 1932266526), Managing and Securing a Cisco SWAN

(ISBN: 1932266917), C# for Java Programmers (ISBN: 193183654X), Snort 2.0

Intrusion Detection (ISBN: 1931836744), and Security+ Study Guide & DVD Training System (ISBN: 1931836728).

Eli Faskha(Security+, Check Point Certified Master Architect, CCSI, CCSE, CCSE+, MCP) Based in Panama City, Panama, Eli is Founder and President of Soluciones Seguras, a company that specializes in network security and is a Check

Trang 6

Point Gold Partner and Nokia Authorized Partner He was Assistant Technical

Editor for Syngress’ Configuring Check Point NGX VPN-1/Firewall-1 (ISBN: 1597490318) book and Contributing Author for Syngress’ Building DMZs for the

Enterprise (ISBN: 1597491004) Eli is the most experienced Check Point Certified

Security Instructor and Nokia Instructor in the region, and has taught participants from over twenty different countries, in both English and Spanish A 1993 grad- uate of the University of Pennsylvania’s Wharton School and Moore School of Engineering, he also received an MBA from Georgetown University in 1995 He has more than 8 years of Internet development and networking experience, starting with web development of the largest Internet portal in Panama in 1999 and 2000, managing a Verisign affiliate in 2001, and running his own company since then Eli has written several articles for the local media and has been recog- nized for his contributions to Internet development in Panama He can be reached

at eli@solucionesseguras.com.

Michael Gregg(CISSP, CISA, MCSE, MCT, CTT+, A+, N+, Security+, CNA, CCNA, CIW Security Analyst, CCE, CEH, CHFI, DCNP, ES Dragon IDS, TICSA) is the founder and Chief Operating Officer of Superior Solutions, Inc., a Houston-based IT security consulting firm Superior Solutions performs security assessments and penetration testing for Fortune 1000 firms Michael is responsible for working with organizations to develop cost effective and innovative technology solutions to security issues and for evaluating emerging technologies Michael supervises client engagements to ensure high quality solutions are developed for software design issues, systems administration concerns, policy development, and security systems testing.

Michael has more than 20 years experience in the IT field and holds two ciate’s degrees, a bachelor’s degree, and a master’s degree He has written or co-

asso-written a number of other books including Que’s Certified Ethical Hacker Exam

Prep 2 and Inside Network Security Assessment by Sam’s publishing He is the author

of Hack the Stack: Using Snort and Ethereal to Master the 8 Layers of an Insecure

Network (Syngress, ISBN: 1597491098) He is a member of the American College

of Forensic Examiners, the Independent Computer Consulting Association, and the Texas Association for Educational Technology.

Alun Jones(MVP, MCP) is the President of Texas Imperial Software.Texas Imperial Software develops secure networking software and provides security engi- neering consulting services.Texas Imperial Software’s flagship product is WFTPD Pro, a secure FTP server for Windows, written entirely by Alun.

Trang 7

Alun entered the security engineering field as more and more of WFTPD’s support needs indicated that few companies were trying to meet their needs for security on the Internet His current day job is as an Information Systems Security Engineer at Premera Blue Cross, a health insurance provider based in the Pacific Northwest of the USA.

Alun has attended, but not completed, University at Corpus Christi College, Cambridge, and Bath University, and now lives in Seattle, Washington, with his wife, Debbie, and son, Colin.

Marc Perez(MCSE: Security, Security+) is a senior consultant of Networked Information Systems in Boston, MA Representing Network Information Systems’ Microsoft practice, he provides strategic and technical consulting services to mid- size and enterprise-level clients located throughout the Northeast Focusing on securely integrating directory services with messaging and collaboration solutions,

he provides the guidance necessary for enterprises to leverage their technology investments toward more effective communication with an emphasis on presence Educated at the University of Southern Maine, Marc has consulted privately for several organizations in the Boston area and has held roles throughout New England, including four years as an Information Security Manager for MBNA America Bank He currently lives on the North Shore with his wife, Sandra, and his two sons, Aidan and Lucas.

Ido Dubrawsky (CISSP, CCNA, CCDA) is the Chief Security Advisor for Microsoft’s Communication Sector North America, a division of the Mobile and Embedded Devices Group Prior to working at Microsoft, Ido was the acting Security Consulting Practice Lead at AT&T’s Callisma subsidiary and a Senior Security Consultant Before joining AT&T, Ido was a Network Security Architect for Cisco Systems, Inc., SAFE Architecture Team He has worked in the systems and network administration field for almost 20 years in a variety of environments

Contributing Author and Technical Editor

Trang 8

from government to academia to private enterprise He has a wide range of rience in various networks, from small to large and relatively simple to complex Ido is the primary author of three major SAFE white papers and has written, and spoken, extensively on security topics He is a regular contributor to the

expe-SecurityFocus website on a variety of topics covering security issues Previously, he worked in Cisco Systems, Inc Secure Consulting Group, providing network secu- rity posture assessments and consulting services for a wide range of clients In addi- tion to providing penetration-testing consultation, he also conducted security architecture reviews and policy and process reviews He holds a B.Sc and a M.Sc.

in Aerospace Engineering from the University of Texas at Austin.

Christopher A Crayton(MCSE, MCP+I, A+, Network+), is a Certified A+/Network+ Instructor, recognized as “Teacher of the Year” by Keiser College in

2000 He resides in Sarasota, Florida, where he serves as Network Administrator for Protocol, an ECRM company.

Contributing Author

and Technical Reviewer

Trang 9

Contents

Foreword xv

Chapter 1 General Security Concepts: Access Control, Authentication, and Auditing 3

Introduction 4

Introduction to AAA 4

What is AAA? 5

Access Control 6

Authentication 6

Auditing 7

Access Control 7

MAC/DAC/RBAC 8

MAC 8

DAC 9

RBAC 9

Authentication 12

Kerberos 18

CHAP 21

Certificates 22

Username/Password 24

Tokens 25

Multi-factor 26

Mutual Authentication 27

Biometrics 28

Auditing 29

Auditing Systems 29

Logging 35

System Scanning 36

Disabling Non-essential Services, Protocols, Systems and Processes 38

Non-essential Services 38

Non-essential Protocols 39

Disabling Non-essential Systems 39

Disabling Non-essential Processes 40

Disabling Non-Essential Programs 40

Summary of Exam Objectives 44

Exam Objectives Fast Track 45

Exam Objectives Frequently Asked Questions 47

Self Test 48

Self Test Quick Answer Key 54

Chapter 2 General Security Concepts: Attacks 55

Attacks 56

Active Attacks 57

DoS and DDoS 57

Resource Consumption Attacks 59

SYN Attacks 60

DDoS Attacks .61

Software Exploitation and Buffer Overflows 65

MITM Attacks 66

TCP/IP Hijacking 67

Replay Attacks 68

Spoofing Attacks 68

IP Spoofing 68

E-mail Spoofing 71

Web Site Spoofing 73

Phishing 73

Wardialing 74

Dumpster Diving 75

Social Engineering 75

Trang 10

Vulnerability Scanning 77

Passive Attacks 78

Sniffing and Eavesdropping 79

Password Attacks 79

Brute Force Attacks 80

Dictionary-based Attacks 81

Malicious Code Attacks 81

Viruses 82

Worms 84

Trojan Horses 85

Rootkits 86

Back Doors 86

Logic Bombs 89

Spyware and Adware 89

Summary of Exam Objectives 91

Exam Objectives Fast Track 91

Exam Objectives Frequently Asked Questions 94

Self Test 96

Self Test Quick Answer Key 100

Chapter 3 Communication Security: Remote Access and Messaging 103

Introduction 104

The Need for Communication Security 105

Communications-based Security 106

Remote Access Security 107

802.1x 108

EAP 111

Vulnerabilities 111

Media Access Control Authentication 113

VPN 114

Site-to-site VPN 115

Remote Access VPN 117

RADIUS 117

Authentication Process 118

Vulnerabilities 119

TACACS/+ 120

TACACS 120

XTACACS 120

TACACS+ 121

Vulnerabilities 121

PPTP/L2TP 122

PPTP 123

L2TP 127

SSH 129

How SSH Works 129

IPSec 130

IPSec Authentication 132

ISAKMP 133

Vulnerabilities 134

Eavesdropping 134

Data Modification 134

Identity Spoofing 134

User Vulnerabilities and Errors 135

Administrator Vulnerabilities and Errors 135

E-mail Security 136

MIME 138

S/MIME 139

PGP 140

How PGP Works 140

Vulnerabilities 143

SMTP Relay 143

Spoofing 146

E-mail and Mobility 147

E-mail and Viruses 148

Spam 150

Hoaxes 152

Phishing 152

Trang 11

Summary of Security+ Exam Objectives 156

Exam Objectives Fast Track 159

Exam Objectives Frequently Asked Questions 161

Self Test 162

Self Test Quick Answer Key 166

Chapter 4 Communication Security: Wireless 167

Introduction 168

Wireless Concepts 168

Understanding Wireless Networks 168

Overview of Wireless Communication in a Wireless Network 169

Radio Frequency Communications 170

Spread Spectrum Technology 171

Wireless Network Architecture 173

CSMA/CD and CSMA/CA 174

Wireless Local Area Networks 176

WAP 177

WTLS 178

IEEE 802.11 178

IEEE 802.11b 179

Ad-Hoc and Infrastructure Network Configuration 181

WEP 183

Creating Privacy with WEP 184

Authentication .186

Common Exploits of Wireless Networks 193

Passive Attacks on Wireless Networks 193

Active Attacks on Wireless Networks 198

MITM Attacks on Wireless Networks 199

Wireless Vulnerabilities 200

WAP Vulnerabilities 200

WEP Vulnerabilities 201

Security of 64-Bit vs 128-Bit Keys 206

Acquiring a WEP Key 206

Addressing Common Risks and Threats 211

Finding a Target 211

Finding Weaknesses in a Target 215

Exploiting Those Weaknesses 216

Sniffing 217

Protecting Against Sniffing and Eavesdropping 221

Spoofing (Interception) and Unauthorized Access 221

Protecting Against Spoofing and Unauthorized Attacks 223

Network Hijacking and Modification 223

Protection against Network Hijacking and Modification 225

Denial of Service and Flooding Attacks 225

Protecting Against DoS and Flooding Attacks 227

IEEE 802.1x Vulnerabilities 228

Site Surveys 229

Additional Security Measures for Wireless Networks 229

Using a Separate Subnet for Wireless Networks 230

Using VPNs for Wireless Access to Wired Networks 230

Temporal Key Integrity Protocol 232

Message Integrity Code (MIC) 233

IEEE 802.11i Standard 234

Implementing Wireless Security: Common Best Practices 235

Summary 238

Exam Objectives Fast Track 240

Exam Objectives Frequently Asked Questions 245

Self Test 247

Self Test Quick Answer Key 252

Chapter 5 Communication Security: Web Based Services 253

Introduction 254

Web Security 254

Web Server Lockdown 255

Managing Access Control 256

Handling Directory and Data Structures 257

Eliminating Scripting Vulnerabilities 260

Logging Activity 262

Trang 12

Performing Backups 262

Maintaining Integrity 263

Finding Rogue Web Servers 263

Stopping Browser Exploits 268

Exploitable Browser Characteristics 269

Cookies 269

Web Spoofing 272

Web Server Exploits 275

SSL and HTTP/S 276

SSL and TLS 277

HTTP/S 279

TLS 280

S-HTTP 280

Instant Messaging 281

Packet Sniffers and Instant Messaging 283

Text Messaging and Short Message Service (SMS) 284

Web-based Vulnerabilities 286

Understanding Java-, JavaScript-, and ActiveX-based Problems 286

Preventing Problems with Java, JavaScript, and ActiveX 303

Programming Secure Scripts 306

Code Signing: Solution or More Problems? 308

Understanding Code Signing 309

The Benefits of Code Signing 309

Problems with the Code Signing Process 310

Buffer Overflows 312

Making Browsers and E-mail Clients More Secure 313

Restricting Programming Languages 314

Keep Security Patches Current 314

Securing Web Browser Software 316

Securing Microsoft IE 316

CGI 322

What is a CGI Script and What Does It Do? .323

Typical Uses of CGI Scripts 325

Break-ins Resulting from Weak CGI Scripts 326

CGI Wrappers 328

Nikto 328

FTP Security 330

Active and Passive FTP 330

S/FTP 331

Secure Copy 332

Blind FTP/Anonymous 332

FTP Sharing and Vulnerabilities 333

Packet Sniffing FTP Transmissions 335

Directory Services and LDAP Security 338

LDAP 340

LDAP Directories 340

Organizational Units 341

Objects, Attributes and the Schema 342

Securing LDAP 343

Summary of Exam Objectives 346

Exam Objectives Fast Track 346

Exam Objectives Frequently Asked Questions 349

Self Test 350

Self Test Quick Answer Key 354

Chapter 6 Infrastructure Security: Devices and Media 357

Introduction 358

Device-based Security 358

Firewalls 359

Packet-filtering Firewalls 361

Application-layer Gateways 367

Stateful Inspection Firewalls 369

Routers 371

Switches 374

Wireless 376

Modems 378

RAS 381

Trang 13

Telecom/PBX 383

Virtual Private Network 384

IDS 389

Network Monitoring/Diagnostic 392

Workstations 393

Servers 397

Mobile Devices 399

Media-based Security 400

Coax 401

Thin Coax 401

Thick Coax 402

Vulnerabilities of Coax Cabling 403

UTP/STP 404

Fiber Optic 407

Removable Media 408

Magnetic Tape 408

CDRs 409

Hard Drives 410

Diskettes 411

Flashcards 411

Smart Cards 412

Summary of Exam Objectives 414

Exam Objectives Fast Track 417

Exam Objectives Frequently Asked Questions 418

Self Test 419

Self Test Quick Answer Key 424

Chapter 7 Topologies and IDS 425

Introduction 426

Security Topologies 427

Security Zones 429

Introducing the Demilitarized Zone 432

Intranet 440

Extranet 443

VLANs 445

Network Address Translation 447

Tunneling 450

Intrusion Detection .452

Characterizing IDSes 454

Signature-based IDSes and Detection Evasion 459

Popular Commercial IDS Systems 461

Honeypots and Honeynets 464

Judging False Positives and Negatives 468

Incident Response 469

Summary of Exam Objectives 470

Exam Objectives Fast Track 471

Exam Objectives Frequently Asked Questions 473

Self Test 474

Self Test Quick Answer Key 479

Chapter 8 Infrastructure Security: System Hardening 481

Introduction 482

Concepts and Processes of OS and NOS Hardening 483

File System 485

Updates 487

Hotfixes 488

Service Packs 488

Patches 489

Network Hardening 489

Updates (Firmware) 490

Configuration 490

Enabling and Disabling Services and Protocols .492

ACLs 498

Application Hardening 499

Updates 500

Hotfixes 500

Service Packs 501

Patches 501

Trang 14

E-mail Servers 503

FTP Servers 504

DNS Servers 505

NNTP Servers 506

File and Print Servers 506

DHCP Servers 508

Data Repositories 509

Directory Services 510

Network Access Control .511

Databases 512

Summary of Exam Objectives 515

Exam Objectives Fast Track 515

Exam Objectives Frequently Asked Questions 516

Self Test 517

Self Test Quick Answer Key 522

Chapter 9 Basics of Cryptography 525

Introduction 526

Algorithms 526

What Is Encryption? 527

Symmetric Encryption Algorithms 528

Data Encryption Standard and Triple Data Encryption Standard 529

Advanced Encryption Standard (Rijndael) 531

IDEA 532

Asymmetric Encryption Algorithms 533

Diffie-Hellman 535

El Gamal 537

RSA 537

Hashing Algorithms 538

Concepts of Using Cryptography 541

Confidentiality 541

Integrity 542

Digital Signatures 543

MITM Attacks 544

Authentication 546

Non-Repudiation 547

Access Control 547

One-time Pad 547

Summary of Exam Objectives 548

Exam Objectives Fast Track 549

Exam Objectives Frequently Asked Questions 550

Self Test 552

Self Test Quick Answer Key 556

Chapter 10 Public Key Infrastructure 557

Introduction 558

PKI 558

Trust Models 559

Web-of-trust Model 561

Single Certificate Authority Model 562

Hierarchical Model 563

Certificates 568

X.509 569

Certificate Policies 572

Certificate Practice Statements 573

Revocation 574

Certificate Revocation List 575

OCSP 576

Standards and Protocols 576

Key Management and Certificate Lifecycle 579

Centralized vs Decentralized 579

Storage 580

Hardware Key Storage vs Software Key Storage 580

Private Key Protection 583

Escrow 583

Expiration 585

Revocation 586

Status Checking 587

Trang 15

Suspension 588

Status Checking 588

Recovery 589

Key Recovery Information 589

M of N Control 590

Renewal 591

Destruction 592

Key Usage 593

Multiple Key Pairs (Single, Dual) 593

Summary of Exam Objectives 594

Exam Objectives Fast Track 595

Exam Objectives Frequently Asked Questions 596

Self Test 597

Self Test Quick Answer Key 602

Chapter 11 Operational and Organizational Security: Incident Response 605

Introduction 606

Physical Security 606

Access Control 609

Physical Barriers 615

Biometrics 618

Tailgating 619

Dumpster Diving 620

Social Engineering 620

Phishing 622

Environment 622

Wireless Cells 625

Location 626

Shielding 627

Fire Suppression 629

Forensics 630

Awareness 632

Conceptual Knowledge 634

Understanding 634

What Your Role Is 636

Chain of Custody 640

Preservation of Evidence 641

Collection of Evidence 645

Risk Identification 647

Asset Identification 649

Risk Assessment 651

Threat Identification 654

Vulnerabilities 656

Summary of Exam Objectives 659

Exam Objectives Fast Track 659

Exam Objectives Frequently Asked Questions 662

Self Test 664

Self Test Quick Answer Key 670

Chapter 12 Operational and Organizational Security: Policies and Disaster Recovery 671

Introduction 672

Policies and Procedures 673

Security Policies 675

Restricted Access Policies 676

Workstation Security Policies 677

Physical Security Policies 680

Security Procedures 682

Acceptable Use Policies 682

Due Care 685

Privacy 687

Separation of Duties 689

Need to Know 690

Password Management 691

Strong Passwords 692

Password Changes and Restrictions 692

Using Passwords as Part of a Multifaceted Security System 693

Administrator Accounts 694

Trang 16

SLA 694

Disposal/Destruction 695

HR Policy 697

Code of Ethics 699

Incident Response Policy 699

Privilege Management 704

User/Group/Role Management 704

Single Sign-on 708

Centralized vs Decentralized 709

Auditing 711

Privilege 712

Usage 713

Escalation 713

MAC/DAC/RBAC 714

Education and Documentation 715

Communication 716

User Awareness 717

Education 719

Online Resources 721

Documentation 722

Standards and Guidelines 722

Systems Architecture .724

Change Documentation 726

Logs and Inventories .726

Classification 727

Notification 729

Retention/Storage 729

Destruction 730

Disaster Recovery 731

Backups 731

Rotation Schemes 733

Offsite Storage 735

Secure Recovery 736

Alternate Sites 738

Disaster Recovery Plan 740

Business Continuity 741

Utilities 743

High Availability/Fault Tolerance 744

Summary of Exam Objectives 747

Exam Objectives Fast Track 748

Exam Objectives Frequently Asked Questions 753

Self Test 755

Self Test Quick Answer Key 760

Self Test Appendix 761

Chapter 1: General Security Concepts: Access Control, Authentication, and Auditing 761

Chapter 2: General Security Concepts: Attacks 769

Chapter 3: Remote Access and Email 773

Chapter 4: Communication Security: Wireless 778

Chapter 5: Communication Security: Web Based Services 783

Chapter 6: Infrastructure Security: Devices and Media 787

Chapter 7:Topologies and IDS 792

Chapter 8: Infrastructure Security: System Hardening 797

Chapter 9: Basics of Cryptography 803

Chapter 10: Public Key Infrastructure 808

Chapter 11: Operational and Organizational Security: Incident Response 814

Chapter 12: Operational and Organizational Security: Policies and Disaster Recovery 821

Index 829

Trang 17

This book’s primary goal is to help you prepare to take and pass CompTIA’s Security+ exam Our ondary purpose in writing this book is to provide exam candidates like you with knowledge and skills that

sec-go beyond the minimum requirements for passing the exam, and help to prepare you to work in the real world of computer and network security.

What Is CompTIA Security+?

Computer and network security is the hottest subspecialty in the IT field today, and a number of product vendors and vendor-neutral organizations offer certification exams to allow IT professionals to test their knowledge and skills in basic security practices and standards.The Computing Technology Industry Association (CompTIA) has positioned itself for the last two decades as a leading trade association devoted

to promoting standards and providing IT education One of CompTIA’s primary roles has been ment of vendor-neutral certification exams to evaluate the skill sets of current and aspiring IT profes- sionals.

develop-CompTIA’s certifications are well regarded within the IT community, particularly as validation of basic credentials that can be used by employers in screening candidates for entry-level positions Microsoft, Cisco, Novell, and other vendors allow the use of CompTIA certifications in some of their own certifica- tion programs as electives or substitution for one of their exams For example, the CompTIA A+ and Network+ certifications can be applied toward Microsoft’s MCSA certification.

One advantage of the CompTIA exams that make them especially popular is the fact that unlike most vendor-specific exams, they are considered to be lifetime certifications that do not expire; once you’ve obtained a CompTIA certification, you never have to renew it.

Trang 18

Prerequisites and Preparation

In comparison to other security certifications, such as the CISSP and SANS GIAC, the Security+ is an entry-level certification, and there are no prerequisites (prior exams or certifications) required to take the exam However, CompTIA specifies that the target audience for the exam consists of professionals with two years of networking experience We recommend that test-takers have a good grasp of basic computer networking concepts, as mastering many of the topics—especially in the domains of communications and infrastructure security—requires a basic understanding of network topology, protocols, and services Passing the A+ and Network+ exams prior to pursuing the Security+ certification, although not required, provides an excellent foundation for a better understanding when studying security topics and is recommended by CompTIA Because this is a vendor-neutral exam, it also helps to have some exposure to the computer operating systems most commonly used in a business environment: Windows and

Linux/UNIX.

Hands-on experience in working with the security devices and software covered in the exam (for example, firewalls, certificate services, virtual private networks [VPNs], wireless access, and so forth) is

invaluable, although it is possible to pass the exam without direct hands-on experience.The Exercises in

each chapter are designed to walk readers through the practical steps involved in implementing the rity measures discussed in the text.

secu-Exam Overview

The structure of this book is designed to closely follow the exam objectives It is organized to make it easy

to review exam topics according to the objective domain in which they fall Under each learning domain,

we go into detail to provide a good overview of the concepts contained in each subsection of the

CompTIA objectives Following is a brief overview of the specific topics covered:

General Security Concepts: Introduction This section introduces the “AAA” triad of security concepts: access control, authentication, and auditing Readers are also introduced to the terminology used in the computer security field, and learn about the primary purposes of computer/network security: providing confidentiality of data, preserving integrity of data, and ensuring availability of data to authorized users.

General Security Concepts: Access Control This section focuses on ways that network security specialists can control access to network resources, and discusses three important types

of access control: Mandatory Access Control (MAC), Discretionary Access Control (DAC), and Role-Based Access Control (RBAC).

General Security Concepts: Authentication This section covers the many available methods for authenticating users and computers on a network (that is, validating the identity of

a user or computer before establishing a communication session) Industry standard protocols are covered, including Kerberos (used by both UNIX and newer Windows operating systems for authenticating users requesting access to resources), and the Challenge Handshake

Authentication Protocol, or CHAP, used for authenticating remote access users Use of digital certificates, tokens, and user/password authentication is discussed Multifactor authentication (use of more than one authentication method for added security), mutual authentication (two- way authentication between client and server), and biometric authentication (use of physiolog- ical characteristics to validate identity) are all thoroughly covered.

General Security Concepts: Nonessential services and protocols This section discusses those services and protocols that are often installed by default on network computers, which can be disabled for added security when not specifically needed.

Trang 19

General Security Concepts: Attacks This section introduces readers to some of the more commonly used exploits used by hackers to attack or intrude upon systems, including Denial of Service (DoS), backdoor attacks, spoofing, man-in-the-middle attacks, replay,TCP/IP hijacking, weak key and mathematical exploits, password-cracking methods, and software exploits.The reader will not only learn the technical details of how these attacks work but also become aware

of how to prevent, detect, and respond to such attacks.

General Security Concepts: Malicious Code This section deals with computer viruses, Trojan horse programs, logic bombs, worms, and other destructive “malware” that can be intro- duced—either deliberately or accidentally—into a system, usually via the network.

General Security Concepts: Social Engineering This section examines the phenomenon

of using social skills (playacting, charisma, persuasive ability) to obtain information (such as words and account names) needed to gain unauthorized access to a system or network Readers will learn how these “human exploits” work and how to guard against them.

pass-■ General Security Concepts: Auditing This section covers the ways that security sionals can use logs and system scanning tools to gather information that will help detect attempted intrusions and attacks, and to detect security holes that can be plugged before out- siders have a chance to find and exploit them.

profes-■ Communications Security: Remote Access This section deals with securing connections that come via phone lines, dedicated leased lines, wireless technology, and the Internet.The reader

will learn about the 802.1x standards that govern implementation of wireless networking and the

use of VPNs to create a secure “tunnel” from one site to another through the Internet Popular remote authentication methods, such as Remote Authentication Dial-In User Service (RADIUS) and Terminal Access Controller Access System ( TACACS+) will be discussed, and readers will learn about tunneling protocols such as Point-to-Point Tunneling Protocol (PPTP) and Layer 2 Tunneling Protocol (L2TP), as well as Secure Shell (SSH) Readers will also learn about Internet Protocol Security (IPSec), which can be used either as a tunneling protocol or for encryption of data as it moves across the network (IPSec will be a standard part of the next generation of IP, IPv6) Vulnerabilities related to all these technologies will be covered, as well.

Communication Security: E-mail This section will discuss how e-mail can be secured, including both client-side and server-side technologies Use of Secure Multipurpose Internet Mail Extensions (MIME) and Pretty Good Privacy (PGP) will be discussed, as will spam (unwanted e-mail advertising) and e-mail hoaxes.

Communications Security: Web This section discusses World Wide Web-based ties and how Web transactions can be secured using Secure Sockets Layer/Transport Layer Security (SSL/TLS) and Secure Hypertext Transfer Protocol (HTTP/S).The reader will get a good background in how the Web works, including naming conventions and name resolution.

vulnerabili-Modern Web technologies that present security or privacy vulnerabilities will also be covered, including JavaScript, ActiveX, buffer overflows, cookies, signed applets, CGI script, and others.

Communications Security: Directory This section will introduce the reader to the cept of directory services and will discuss the X.500 and Lightweight Directory Access Protocol (LDAP) standards upon which many vendors’ directory services (including Novell’s NDS and Microsoft’s Active Directory) are built.

con-■ Communications Security: File Transfer This section discusses the File Transfer Protocol (FTP), how files are shared and the vulnerabilities that are exposed through file sharing, the dangers of blind/anonymous FTP, and how protections can be implemented using Secure FTP.

Trang 20

This section also addresses packet sniffing, the capture and examination of individual cations packets using protocol analyzer tools.

communi-■ Communications Security: Wireless This section goes into detail about various protocols used in wireless communication and security, including the Wireless Transport Layer Security (WTLS) protocol and the Wired Equivalent Privacy (WEP) protocol We also discuss the Wireless Application Protocol (WAP), which is used for communications by wireless mobile

devices such as mobile phones, and the 802.1x standards for port-based authentication.

Infrastructure Security: Devices This section provides an overview of the plethora of ware devices that are involved in implementing network security, including firewalls, routers, switches, wireless access points, modems, Remote Access Services (RAS) servers, telecom/PBX equipment, hardware-based VPNs, Intrusion Detection Systems (IDSes), network monitoring and diagnostic equipment, workstations, servers, and mobile communications devices.The role each plays in network security will be examined.

hard-■ Infrastructure Security: Media This section reviews the types of physical media over which network communications can take place, including coaxial cable, unshielded and shielded twisted pair (UTP/STP), and fiber optic cabling We also look at removable media on which computer data can be stored, including tape, recordable CD/DVD, hard disks, floppy diskettes, flash media (Compact Flash, SD cards, MMC, SmartMedia, and memory sticks), and smart cards (credit card sized devices that contain a tiny “computer on a chip” and are capable of both storing and processing information.

Infrastructure Security: Security Topologies This section explores the ways in which topological structure can impact security issues on a network, and it examines the concept of security zones and how the network can be divided into areas (including the DMZ, intranet, and extranet) for application of differing security levels We also take a look at how virtual LANs (VLANs) can be used in a security context, and the advantages of Network Address Translation (NAT) and tunneling in creating an overall security plan.

Infrastructure Security: Intrusion Detection This section deals with IDS devices, both network-based and host-based Readers will learn the differences between active and passive detection and where each fits into the security plan We also discuss the role of honeypots and honeynets in distracting, detecting, and identifying attackers, and we provide information on incident response in relation to network intrusions and attacks.

Infrastructure Security: Security Baselines This section takes a three-pronged approach to overall system hardening We discuss how to harden (secure) computer/network operating sys- tems, including the file system.The importance of applying hot fixes, service packs, patches, and other security updates is emphasized Next, we discuss hardening of the network, with a focus

on the importance of configuration/settings and use of access control lists (ACLs) Finally, we discuss application hardening, with specifics on how to secure Web servers, e-mail servers, FTP servers, DNS servers, Network News Transport Protocol (NNTP) servers, file and print servers, Dynamic Host Configuration Protocol (DHCP) servers, and data repositories (including direc- tory services and databases).

Basics of Cryptography This section introduces the concepts upon which encryption nologies are based, including symmetric and asymmetric algorithms and hashing algorithms Readers will learn how encryption can provide confidentiality, integrity, authentication, and nonrepudiation.The use of digital signatures is discussed We show readers how cryptographic algorithms and digital certificates are used to create a Public Key Infrastructure (PKI) for vali-

Trang 21

tech-dating identity through a trusted third party (certification server) Key management, certificate issuance, expiration and revocation, and other elements of a PKI are discussed.

Operational/Organizational Security This section deals with the important topic of ical security and the environmental factors that affect security We also cover disaster recovery plans, encompassing backup policies, off-site storage, secure recovery, and business continuity.

phys-Security policies and procedures are covered in detail, with a focus on acceptable use policies, due care, privacy issues, separation of duties, need to know, password management, service level agreements (SLAs), disposal/destruction policies, human resources policies, and incident response policies Privilege management, computer forensics awareness (including chain of cus- tody and collection/preservation of evidence), risk identification, education and training of users, executives and HR personnel, and documentation standards and guidelines are also important components of this learning domain.

Test-Taking Tips

Different people work best using different methods However, there are some common methods of ration and approach to the exam that are helpful to many test-takers In this section, we provide some tips

prepa-that other exam candidates have found useful in preparing for and actually taking the exam.

■ Exam preparation begins before exam day Ensure that you know the concepts and terms welland feel confident about each of the exam objectives Many test-takers find it helpful to make flash cards or review notes to study on the way to the testing center A sheet listing acronyms and abbreviations can be helpful, as the number of acronyms (and the similarity of different acronyms) when studying IT topics can be overwhelming.The process of writing the material down, rather than just reading it, will help to reinforce your knowledge.

■ Many test-takers find it especially helpful to take practice exams that are available on theInternet and within books such as this one.Taking the practice exams not only gets you used to the computerized exam-taking experience but also can be used as a learning tool.The best practice tests include detailed explanations of why the correct answer is correct and why the incorrect answers are wrong.

■ When preparing and studying, you should try to identify the main points of each objective tion Set aside enough time to focus on the material and lodge it into your memory On the day of the exam, you should be at the point where you don’t have to learn any new facts or concepts, but need simply to review the information already learned.

sec-■ The Exam Warning sidebars in this book highlight concepts that are likely to be tested.You may

find it useful to go through and copy these into a notebook as you read the book bering that writing something down reinforces your ability to remember it) and then review them just prior to taking the exam.

(remem-■ The value of hands-on experience cannot be stressed enough Although the Security+ examquestions tend to be generic (not vendor specific), they are based on test-writers’ experiences in the field, using various product lines.Thus, there might be questions that deal with the products

of particular hardware vendors, such as Cisco Systems, or particular operating systems, such as Windows or UNIX Working with these products on a regular basis, whether in your job envi- ronment or in a test network that you’ve set up at home, will make you much more comfort- able with these questions.

Trang 22

■ Know your own learning style and use study methods that take advantage of it If you’re primarily

a visual learner, reading, making diagrams, or watching video files on CD may be your best study methods If you’re primarily auditory, listening to classroom lectures, playing audiotapes in the car

as you drive, and repeating key concepts to yourself aloud may be more effective If you’re a

kines-thetic learner, you’ll need to actually do the exercises, implement the security measures on your

own systems, and otherwise perform hands-on tasks to best absorb the information Most of us can learn from all of these methods, but have a primary style that works best for us.

■ Use as many little mnemonic tricks as possible to help you remember facts and concepts For example, to remember which of the two IPSec protocols (AH and ESP) encrypts data for confi- dentiality, you can associate the “E” in encryption with the “E” in ESP.

■ Although it may seem obvious, many exam-takers ignore the physical aspects of exam tion.You are likely to score better if you’ve had sufficient sleep the night before the exam, and if you are not hungry, thirsty, hot/cold, or otherwise distracted by physical discomfort Eat prior to going to the testing center (but don’t indulge in a huge meal that will leave you uncomfort- able), stay away from alcohol for 24 hours prior to the test, and dress appropriately for the tem- perature in the testing center (if you don’t know how hot or cold the testing environment tends

prepara-to be, you may want prepara-to wear light clothes with a sweater or jacket that can be taken off ).

■ Before you go to the testing center to take the exam, be sure to allow time to arrive on time, takecare of any physical needs, and step back to take a deep breath and relax.Try to arrive slightly early, but not so far in advance that you spend a lot of time worrying and getting nervous about the testing process.You may want to do a quick last-minute review of notes, but don’t try to

“cram” everything the morning of the exam Many test-takers find it helpful to take a short walk

or do a few calisthenics shortly before the exam, as this gets oxygen flowing to the brain.

■ Before beginning to answer questions, use the pencil and paper provided to you to write downterms, concepts, and other items that you think you may have difficulty remembering as the exam goes on For example, you might note the differences between MAC, DAC, and RBAC Then you can refer back to these notes as you progress through the test.You won’t have to worry about forgetting the concepts and terms you have trouble with later in the exam.

■ Sometimes the information in a question will remind you of another concept or term that youmight need in a later question Use your pen and paper to make note of this in case it comes

up later on the exam.

■ It is often easier to discern the answer to scenario questions if you can visualize the situation.Use your pen and paper to draw a diagram of the network that is described to help you see the relationships between devices, IP addressing schemes, and so forth.This is especially helpful in questions dealing with how to set up DMZs and firewalls.

■ When appropriate, review the answers you weren’t sure of However, you should only changeyour answer if you’re sure that your original answer was incorrect Experience has shown that more often than not, when test-takers start second-guessing their answers, they end up changing correct answers to the incorrect Don’t “read into” the question (that is, don’t fill in or assume information that isn’t there); this is a frequent cause of incorrect responses.

Trang 23

About the Security+

Study Guide and DVD Training System

In this book, you’ll find many interesting sidebars designed to highlight the most important concepts

being presented in the main text.These include the following:

Exam Warnings focus on specific elements on which the reader needs to focus in order to

pass the exam (for example, “Be sure you know the difference between symmetric and asymmetric

encryption”).

Test Day Tipsare short tips that will help you in organizing and remembering information for the exam (for example, “When preparing for the exam on test day, it may be helpful to have a sheet with definitions of abbreviations and acronyms handy for a quick last-minute review”).

Notes from the Underground contain background information that goes beyond what you need to know from the exam, providing a deep foundation for understanding the security con- cepts discussed in the text.

Damage and Defense relate real-world experiences to security exploits while outlining defensive strategies.

Head of the Class discussions are based on the author’s interactions with students in live classrooms, and the topics covered here are the ones students have the most problems with.

Each chapter also includes hands-on exercises in planning and configuring the security measures cussed It is important that you work through these exercises in order to be confident you know how to

dis-apply the concepts you have just read about.

You will find a number of helpful elements at the end of each chapter For example, each chapter

con-tains a Summary of Exam Objectives that ties the topics discussed in that chapter to the specific objectives lished by CompTIA Each chapter also contains an Exam Objectives Fast Track, which boils all exam objectives down to manageable summaries that are perfect for last-minute review The Exam Objectives Frequently Asked

pub-Questions answer those questions that most often arise from readers and students regarding the topics covered

in the chapter Finally, in the Self Test section, you will find a set of practice questions written in a

multiple-choice form similar to those you will encounter on the exam.You can use the Self Test Quick Answer Key that follows the Self Test questions to quickly determine what information you need to review again.The Self Test

Appendix at the end of the book provides detailed explanations of both the correct and incorrect answers.

Additional Resources

There are two other important exam preparation tools included with this Study Guide One is the DVD

included in the back of this book.The other is the practice exam available from our Web site.

Training DVD-ROM.A complete Adobe PDF format version of the print Study Guide A Practice Exam contain 60 questions, with detail answer explanations Fast Tracks for quick topic review, provided in both HTML and PowerPoint format.

Web-based practice exams Just visit us at www.syngress.com/certification to access a

complete Security + Exam Simulation.These exams are written to test you on all of CompTIA’s published certification objectives.The exam simulator runs in both “live” and

“practice” mode Use “live” mode first to get an accurate gauge of your knowledge and skills, and then use practice mode to launch an extensive review of the questions that gave you trouble.

Trang 25

General Security Concepts

S E C U R I T Y + 2 e

Domain 1.0

Trang 27

General Security Concepts: Access Control, Authentication, and Auditing

Exam Objectives in this Chapter:

Exam Objectives Review:

 Summary of Exam Objectives

 Exam Objectives Fast Track

 Exam Objectives Frequently Asked Questions

 Self Test

 Self Test Quick Answer Key

Trang 28

Security+ is a security fundamentals and concepts exam No security conceptsexam would be complete without questions on Access Control, Authentication, andAuditing (AAA) AAA comprises the most basic fundamentals of work in theInformation Technology (IT) security field, and is critical to understand for any ITsecurity practitioner In this chapter, you will study CompTIA’s test objectives forSection 1, “General Security Concepts.”You will be introduced to AAA and itsfiner details, as well as the concepts and terminology that will be explored anddeveloped in later chapters.We end this chapter with a discussion on removingnon-essential services to secure any platform you may be working on

EXAM WARNING

It is important to remember that the Security+ exam is based on general

IT security best practices, and requires an understanding of a wide range

of IT security concepts This means that most of the information that you need to pass the exam can be gained through research of the var- ious Requests for Comments (RFCs) published by the Internet

Engineering Steering Group (IESG) While this book contains the mation necessary to pass the exam, if you need more details on any spe- cific subject, the RFCs are a great resource All of the RFCs can be found

infor-at the IESG RFC page locinfor-ated infor-at http://tools.ietf.org/rfc/ or searched for using the search engine located at www.rfc.net

Introduction to AAA

AAA are a set of primary concepts that aid in understanding computer and work security as well as access control.These concepts are used daily to protectproperty, data, and systems from intentional or even unintentional damage AAA isused to support the Confidentiality, Integrity, and Availability (CIA) security con-cept, in addition to providing the framework for access to networks and equipmentusing Remote Authentication Dial-In User Service (RADIUS) and TerminalAccess Controller Access Control System (TACACS/TACACS+)

net-A more detailed description of net-Anet-Anet-A is discussed in RFC 3127, which can befound at http://tools.ietf.org/html/rfc3127.This RFC contains an evaluation ofvarious existing protocols against the AAA requirements, and can help you under-

Trang 29

Head of the Class…

stand the specific details of these protocols.The AAA requirements themselves can

be found in RFC 2989 located at http://tools.ietf.org/html/rfc2989

Letters, Letters, and More Letters

It is important to understand the acronyms used in the Security+ exam.

For purposes of the Security+ exam, two specific abbreviations need to be explained to avoid confusion For general security study and the

Security+ exam, AAA is defined as “Access Control, Authentication, and

Auditing.” Do not confuse this with Cisco’s implementation and tion of AAA, which is “Authentication, Auditing, and Accounting.” While similar in function and usage, the Security+ exam uses the first definition.

descrip-The second abbreviation requiring clarification is CIA For purposes

of the Security+ exam, CIA is defined as “Confidentiality, Integrity, and Availability.” Other literature and resources such as the Sarbanes-Oxley Act and the Health Insurance Portability and Accountability Act of 1996 (HIPAA) guidelines may refer to CIA as “Confidentiality, Integrity, and Authentication.”

Confidentiality The contents or data are not revealed

Integrity The contents or data are intact and have not been modified

Availability The contents or data are accessible if allowed

AAA consists of three separate areas that work together.These areas provide alevel of basic security in controlling access to resources and equipment in networks.This control allows users to provide services that assist in the CIA process for fur-ther protection of systems and assets Let’s start with basic descriptions of the threeareas, and then break each down to explore their uses and the security they pro-vide Finally, we will work with examples of each AAA component

Trang 30

Head of the Class…

Let’s Talk About Access and Authentication

The difference between access control and authentication is a very important distinction, which you must understand in order to pass the Security+ exam Access control is used to control the access to a resource through some means This could be thought of as a lock on a door or a guard in a building Authentication on the other hand is the process of verifying that the person trying to access whatever resource is being con- trolled is authorized to access the resource In our analogy, this would be the equivalent of trying the key or having the guard check your name against a list of authorized people So in summary, access control is the lock and authentication is the key

Access Control

Access control can be defined as a policy, software component, or hardware

compo-nent that is used to grant or deny access to a resource.This can be an advancedcomponent such as a Smart Card, a biometric device, or network access hardwaresuch as routers, remote access points such as Remote Access Service (RAS), andvirtual private networks (VPNs), or the use of wireless access points (WAPs) It canalso be file or shared resource permissions assigned through the use of a networkoperating system (NOS) such as Microsoft Windows using New Technology FileSystem (NTFS) in conjunction with Active Directory, Novell NetWare in conjunc-tion with Novell Directory Services (NDS) or eDirectory, and UNIX systemsusing Lightweight Directory Access Protocol (LDAP), Kerberos, or Sun

Microsystem’s Network Information System (NIS) and Network InformationSystem Plus (NIS+) Finally, it can be a rule set that defines the operation of a soft-ware component limiting entrance to a system or network.We will explore anumber of alternatives and possibilities for controlling access

Authentication

Authentication can be defined as the process used to verify that a machine or user

attempting access to the networks or resources is, in fact, the entity being sented.We will examine a process that proves user identity to a remote resourcehost.We will also review a method of tracking and ensuring non-repudiation of

pre-authentication (see Chapter 9) For this chapter, non-repudiation is the method used

(time stamps, particular protocols, or authentication methods) to ensure that thepresenter of the authentication request cannot later deny they were the originator

of the request In the following sections, authentication methods include

Trang 31

presenta-tion of credentials (such as a username and password, Smart Card, or personal tification number [PIN]) to a NOS (logging on to a machine or network), remoteaccess authentication, and a discussion of certificate services and digital certificates.

iden-The authentication process uses the information presented to the NOS (such asusername and password) to allow the NOS to verify the identity based on thosecredentials

Auditing

Auditing is the process of tracking and reviewing events, errors, access, and

authenti-cation attempts on a system Much like an accountant’s procedure for keeping track

of the flow of funds, you need to be able to follow a trail of access attempts, accessgrants or denials, machine problems or errors, and other events that are important

to the systems being monitored and controlled In the case of security auditing, youwill learn about the policies and procedures that allow administrators to trackaccess (authorized or unauthorized) to the network, local machine, or resources

Auditing is not enabled by default in many NOSes, and administrators must oftenspecify the events or objects to be tracked.This becomes one of the basic lines ofdefense in the security and monitoring of network systems.Tracking is used alongwith regular reading and analysis of the log files generated by the auditing process

to better understand if the access controls are working

Access Control

As we further develop the concepts of AAA, we need to explore the nents of the three parts In the case of access control, we must further exploremethods and groupings that apply to the area.We will look at new terminologyand then explore, through examples, what the subcomponents control and howthey are used to secure networks and equipment

subcompo-EXAM WARNING

One of the most important things to learn for the Security+ exam is the terminology used in the IT security industry Throughout this chapter and others, you will be presented with a large number of terms and acronyms that may or may not be familiar to you These are all industry-recognized terms and form the unique language used by IT security professionals.

Knowing and understanding the terms and acronyms used in this book will help you to understand the questions presented on the exam.

Trang 32

In discussing access control, Mandatory Access Control (MAC), DiscretionaryAccess Control (DAC), and Role-Based Access Control (RBAC) are individualareas that take on a new meaning

■ MAC, in this context, is not a network interface card (NIC) hardwareaddress, but rather a concept called Mandatory Access Control

■ DAC is short for Discretionary Access Control, which is often referred to

as the use of discretionary access control lists (DACLs)

■ RBAC should not be confused with rule-based access control, but isinstead an access control method based on the use of the specific rolesplayed by individuals or systems

All three methods have varying uses when trying to define or limit access toresources, devices, or networks.The following sections explore and illustrate each ofthe three access control methods

MAC

MAC is generally built into and implemented within the operating system beingused, although it may also be designed into applications MAC components arepresent in UNIX, Linux, Microsoft’s Windows operating systems, OpenBSD, andothers Mandatory controls are usually hard-coded and set on each object or

resource individually MAC can be applied to any object within an operatingsystem, and allows a high level of granularity and function in the granting ordenying of access to the objects MAC can be applied to each object, and can con-trol access by processes, applications, and users to the object It cannot be modified

by the owner or creator of the object

The following example illustrates the level of control possible.When usingMAC, if a file has a certain level of sensitivity (or context) set, the system will notallow certain users, programs, or administrators to perform operations on that file.Think of setting the file’s sensitivity higher than that of an e-mail program.You canread, write, and copy the file as desired, but without an access level of root, supe-ruser, or administrator, you cannot e-mail the file to another system, because the e-mail program lacks clearance to manipulate the file’s level of access control Forexample, this level of control is useful in the prevention of Trojan horse attacks,since you can set the access levels appropriately to each system process, thus

severely limiting the ability of the Trojan horse to operate.The Trojan horse would

Trang 33

have to have intimate knowledge of each of the levels of access defined on thesystem to compromise it or make the Trojan horse viable within it.

To review briefly, MAC is:

Non-discretionary The control settings are hard-coded and not able by the user or owner

modifi-■ Multilevel Control of access privileges is definable at multiple accesslevels

Label-based May be used to control access to objects in a database

Universally Applied Applied to all objects

DAC

DAC is the setting of access permissions on an object that a user or application hascreated or has control of.This includes setting permissions on files, folders, andshared resources.The “owner” of the object in most operating system (OS) envi-ronments applies discretionary access controls.This ownership may be transferred

or controlled by root or other superuser/administrator accounts It is important tounderstand that DAC is assigned or controlled by the owner, rather than being hardcoded into the system DAC does not allow the fine level of control available withMAC, but requires less coding and administration of individual files and resources

To summarize, DAC is:

Discretionary Not hard-coded and not automatically applied by theOS/NOS or application

Controllable Controlled by the owner of the object (file, folder, or othertypes)

Transferable The owner may give control away

RBAC

RBAC can be described in different ways.The most familiar process is a ison or illustration utilizing the “groups” concept In Windows, UNIX/Linux, andNetWare systems, the concept of groups is used to simplify the administration ofaccess control permissions and settings.When creating the appropriate groupings,you have the ability to centralize the function of setting the access levels for variousresources within the system.We have been taught that this is the way to simplifythe general administration of resources within networks and local machines

Trang 34

compar-However, although the concept of RBAC is similar, it is not the exact samestructure.With the use of groups, a general level of access based on a user or

machine object grouping is created for the convenience of the administrator.However, when the group model is used, it does not allow for the true level ofaccess that should be defined, and the entire membership of the group gets thesame access.This can lead to unnecessary access being granted to some members ofthe group

RBAC allows for a more granular and defined access level, without the ality that exists within the group environment A role definition is developed anddefined for each job in an organization, and access controls are based on that role.This allows for centralization of the access control function, with individuals orprocesses being classified into a role that is then allowed access to the network and

gener-to defined resources.This type of access control requires more development andcost, but is superior to MAC in that it is flexible and able to be redefined moreeasily RBAC can also be used to grant or deny access to a particular router or toFile Transfer Protocol (FTP) or Telnet

RBAC is easier to understand using an example Assume that there is a user at acompany whose role within the company requires access to specific shared

resources on the network Using groups, the user would be added to an existinggroup which has access to the resource and access would be granted RBAC on theother hand would have you define the role of the user and then allow that specificrole access to whatever resources are required If the user gets a promotion andchanges roles, changing their security permissions is as simple as assigning them totheir new role If they leave the company and are replaced, assigning the appro-priate role to the new employee grants them access to exactly what they need to

do their job without trying to determine all of the appropriate groups that would

be necessary without RBAC

In summary, RBAC is:

Job Based The role is based on the functions performed by the user

Highly Configurable Roles can be created and assigned as needed or asjob functions change

More Flexible Than MAC MAC is based off of very specific tion, whereas RBAC is based off of a user’s role in the company, whichcan vary greatly

Trang 35

informa-■ More Precise Than Groups RBAC allows the application of the ciple of least privilege, granting the precise level of access required to per-form a function.

prin-EXAM WARNING

Be careful! RBAC has two different definitions in the Security+ exam.

The first is defined as Role-Based Access Control A second definition of

RBAC that applies to control of (and access to) network devices, is

defined as Rule-Based Access Control This consists of creating access

control lists for those devices, and configuring the rules for access to them

EXERCISE 1.01

Almost all current NOSes allow administrators to define or set DAC tings UNIX and Linux accomplish this either by way of a graphical user interface (GUI) or at a terminal window as the superuser creating

set-changes to the settings using the chmod command Windows operating

systems set DAC values using Windows Explorer.

For this exercise, you will view the DAC settings in Windows XP Professional Please note that if you try this in Windows XP Home edi- tion, the DAC settings will not be available To start, open Windows

Explorer Navigate to the %systemroot%\system32 folder (where

%sys-temroot% is the folder Windows 2000 or XP Professional is installed in).

Highlight this folder’s name and select Properties Select the Security

tab; you should see a window as shown in Figure 1.1

Trang 36

Figure 1.1 Viewing the Discretionary Access Control Settings on a Folder

Notice that the administrator account is granted full control sion for this folder Check the access settings for other users and groups that are defined on your machine You should notice that the system has full control, but that various other access settings are in place for different types of access permissions Within the Windows OS, this is the area that allows you to control and modify the DAC settings for your resources

permis-Similar DAC settings are in place for all files and folders stored on NT File System (NTFS) partitions, as well as all objects that exist within Active Directory and all Registry keys.

A similar function is available in most other OSes As mentioned,

UNIX and Linux use the chmod process to control access through DAC.

NetWare also has a file access system in place that is administered by the administrator (who has “Supervisor” rights).

Authentication

Authentication, when looked at in its most basic form, is simply the process used toprove the identity of someone or something that wants access.This can involve

Trang 37

highly complex and secure methods, which may involve higher costs and moretime, or can be very simple For example, if someone you personally know comes

to your door, you visually recognize them, and if you want them to enter, youopen the door In this case, you have performed the authentication process throughyour visual recognition of the individual All authentication processes follow thissame basic premise; that we need to prove who we are or who the individual, ser-vice, or process is before we allow them to use our resources

Authentication allows a sender and receiver of information to validate eachother as the appropriate entities with which they want to work If entities wishing

to communicate cannot properly authenticate each other, there can be no trust inthe activities or information provided by either party Only through a trusted andsecure method of authentication can administrators provide for a trusted and securecommunication or activity

The simplest form of authentication is the transmission of a shared passwordbetween entities wishing to authenticate each other.This can be as simple as asecret handshake or a key As with all simple forms of protection, once knowledge

of the secret key or handshake is disclosed to non-trusted parties, there can nolonger be trust in who is using the secrets

Many methods can be used by an unauthorized person to acquire a secret key,from tricking someone into disclosing it, to high-tech monitoring of communica-tions between parties to intercept the key as it is passed between parties Howeverthe code is acquired, once it is in a non-trusted party’s hands, it can be used tofalsely authenticate and identify someone as a valid party, forging false communica-tions or utilizing the user’s access to gain permissions to the available resources

Original digital authentication systems shared a secret key across the networkwith the entity with which they wanted to authenticate Applications such as Telnetand FTP are examples of programs that simply transmit the username and password

in cleartext to the party they are authenticating Another area of concern is PostOffice Protocol 3 (POP3) e-mail, which, in its default state, sends the completeusername and password information in cleartext, with no protection

The problem with this method of authentication is that anyone that monitors anetwork can possibly capture a secret key and use it to gain access to the services

or to attempt to gain higher privileged access with your stolen authenticationinformation

What methods can be used to provide a stronger defense? As discussed ously, sharing a handshake or secret key does not provide long lasting and securecommunication or the secure exchange of authentication information.This has led

previ-to more secure methods of protection of authentication mechanisms.The following

Trang 38

Cleartext (non-encrypted) authentication is still widely used by many

people who receive their e-mail through POP3 By default, POP3 client applications send the username and password unprotected in cleartext from the e-mail client to the server There are several ways of protecting e-mail account passwords, including connection encryption

Encrypting connections between e-mail clients and servers is the only way of truly protecting your e-mail authentication password This pre- vents anyone from capturing your password or any e-mail you transfer to your client Secure Sockets Layer (SSL) is the general method used to encrypt the connection stream from the e-mail client to a server

If you protect a password using Message Digest 5 (MD5) or a similar crypto cipher, it is possible for anyone who intercepts your “protected” password to identify it through a “brute force attack.” A brute force attack is when someone generates every possible combination of charac- ters and runs each version through the same algorithm used to encrypt the original password until a match is made and a password is cracked Authentication POP (APOP) is used to provide password-only encryp- tion for e-mail authentication It employs a challenge/response method (defined in RFC 1725) that uses a shared time stamp provided by the authenticating server The time stamp is hashed with the username and the shared secret key through the MD5 algorithm

There are still some problems with this process The first is that all values are known in advance except the shared secret key Because of this, there is nothing provided to protect against a brute force attack on the shared key Another problem is that this security method attempts to protect a password, but does nothing to prevent anyone from viewing e- mail as it is downloaded to an e-mail client.

Some brute force crackers, including POP, Telnet, File Transfer Protocol (FTP), and Hypertext Transfer Protocol (HTTP), can be found at http://packetstormsecurity.nl/Crackers/ and can be used as examples for this technique Further discussion of why and how these tools are used can be found in Chapter 2.

Trang 39

EXERCISE 1.02

One of the operations performed in security monitoring and analysis is

packet sniffing—the analysis of network traffic and packets being

trans-mitted to and from the equipment This involves using appropriate ware to intercept, track, and analyze the packets being sent over the network In this exercise, you are going to do some packet sniffing and detection work The steps you use will give you the opportunity to expe- rience first-hand what has been discussed so far about authentication.

soft-Analysis of the traffic on your network provides you with the nity to detect unwanted and unauthorized services, equipment, and invaders in your network.

opportu-Many products exist that allow you to analyze the traffic on your network A number of these are proprietary For example, Microsoft provides Network Monitor on Windows-based server products for use by administrators and server operators to examine network traffic to and from individual machines

A higher-powered version is available in other Microsoft products, including System Management Server (SMS) v 2003 R2 (SMS is now at version 3.0.)

Products are also available from vendors such as Fluke Networks and Agilent’s Advisor product.

Best of all, there are free products To try this exercise, use any of the above products or one of the following:

ettercap http://ettercap.sourceforge.net/

Wireshark www.wireshark.org

This exercise is described using the free tool, Ettercap Let’s get started by verifying the presence of cleartext passwords that are sent on networks daily.

Perform the following steps to set up for the exercise

1 Download and install your tool of choice Note that Ettercap and Ethereal are available for most platforms.

2 Find and note the following information: your POP3 server’s fully qualified domain name (FQDN) or Internet Protocol (IP) address,

Trang 40

a valid username for that server, and a valid password for that server

3 Launch the application you are using (these notes are for Ettercap).

4 In Ettercap, after you have launched the application with the –G

option and are at the initial screen, click Sniff and select the Unified sniffing option.

5 Choose to monitor the appropriate network interface if you have more than one interface configured In Windows, pick the actual network adapter, not the NDISWAN virtual connection.

6 You can then click Start and select Start sniffing The screen

should look something like that shown in Figure 1.2.

Figure 1.2Ettercap Main Screen

7 Your display should now begin to detect and record the network activities on your LAN.

To capture the traffic to your e-mail server, you can do either of the following:

Ngày đăng: 25/03/2014, 11:10

TỪ KHÓA LIÊN QUAN